Abstract is missing.
- CLID: A general approach to validate security policies in a dynamic networkYanyan Yang, Charles U. Martel, Shyhtsun Felix Wu. 1-10 [doi]
- A model for checking consistency in access control policies for network managementVincent Cridlig, Radu State, Olivier Festor. 11-19 [doi]
- Towards simplified specification of policies in different domainsKris Verlaenen, Bart De Win, Wouter Joosen. 20-29 [doi]
- Issues in Designing a Policy Language for Distributed Management of IT InfrastructuresDakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jorge Lobo. 30-39 [doi]
- Efficient Resource Virtualization and Sharing Strategies for Heterogeneous Grid EnvironmentsPawel Garbacki, Vijay K. Naik. 40-49 [doi]
- Compass: Cost of Migration-aware Placement in Storage SystemsAkshat Verma, Upendra Sharma, Rohit Jain, Koustuv Dasgupta. 50-59 [doi]
- Towards an Accounting System for Multi-Provider Grid EnvironmentsGabi Dreo Rodosek, Matthias Gohner, Mario Golling, Michael Kretzschmar. 60-69 [doi]
- A Service Middleware that Scales in System Size and ApplicationsConstantin Adam, Rolf Stadler, Chunqiang Tang, Malgorzata Steinder, Mike Spreitzer. 70-79 [doi]
- Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion DetectionChenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie. 80-89 [doi]
- Interactive Informatics on Internet InfrastructureF. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, S. J. Ben Yoo. 90-99 [doi]
- Real-time Analysis of Flow Data for Network Attack DetectionGerhard Münz, Georg Carle. 100-108 [doi]
- VoIP Honeypot ArchitectureMohamed Nassar, Radu State, Olivier Festor. 109-118 [doi]
- Dynamic Placement of Virtual Machines for Managing SLA ViolationsNorman Bobroff, Andrzej Kochut, Kirk A. Beaty. 119-128 [doi]
- Self-Adaptive Capacity Management for Multi-Tier Virtualized EnvironmentsÍtalo S. Cunha, Jussara M. Almeida, Virgilio Almeida, Marcos Santos. 129-138 [doi]
- Server virtualization in autonomic management of heterogeneous workloadsMalgorzata Steinder, Ian Whalley, David Carrera, Ilona Gaweda, David M. Chess. 139-148 [doi]
- Capacity and Performance Overhead in Dynamic Resource Allocation to Virtual ContainersZhikui Wang, Xiaoyun Zhu, Pradeep Padala, Sharad Singhal. 149-158 [doi]
- Deterministic Models of Software Aging and Optimal Rejuvenation SchedulesArtur Andrzejak, Luís Moura Silva. 159-168 [doi]
- PANACEA Towards a Self-healing Development FrameworkDavid Breitgand, Maayan Goldstein, Ealan Henis, Onn Shehory, Yaron Weinsberg. 169-178 [doi]
- Autonomic Software Release Management for Communications NetworksPratik K. Biswas. 179-188 [doi]
- Management of Multidomain End-to-End Links; A Federated Approach for the Pan-European Research Network Géant 2Mark Yampolskiy, Matthias K. Hamm. 189-198 [doi]
- Using the Network Description Language in Optical NetworksJeroen van der Ham, Paola Grosso, Ronald van der Pol, Andree Toonk, Cees T. A. M. de Laat. 199-205 [doi]
- Path Computation Algorithms for Dynamic Service Provisioning in SDH NetworksRamachandran Madanagopal, N. Usha Rani, Timothy A. Gonsalves. 206-215 [doi]
- Real-time Application Monitoring and Diagnosis for Service Hosting Platforms of Black BoxesHuadong Liu, Hui Zhang 0002, Rauf Izmailov, Guofei Jiang, Xiaoqiao Meng. 216-225 [doi]
- Robust Monitoring of Network-wide Aggregates through GossipingFetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Clemm. 226-235 [doi]
- Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay NetworksYongning Tang, Ehab Al-Shaer, Bin Zhang. 236-245 [doi]
- UAMA: a unified architecture for active measurements in IP networks; End-to-end objetive quality indicatorsGlederson Lessa dos Santos, Vinicius Tavares Guimaraes, Jorge Guedes Silveira, Alexandre T. Vieira, Jose Augusto de Oliveira Neto, Roberto Iraja Tavares da Costa Filho, Ricardo Balbinot. 246-253 [doi]
- Business-Driven Optimization of Policy-Based Management solutionsIssam Aib, Raouf Boutaba. 254-263 [doi]
- Automated Availability Management Driven by Business PoliciesZhongtang Cai, Yuan Chen, Vibhore Kumar, Dejan S. Milojicic, Karsten Schwan. 264-273 [doi]
- Predicting Labor Cost through IT Management Complexity MetricsYixin Diao, Alexander Keller, Sujay S. Parekh, Vladislav V. Marinov. 274-283 [doi]
- The Evaluation of the Efficient Prepaid Scheme TICA for All-IP Networks and Internet ServicesPascal Kurtansky, Peter Reichl, Burkhard Stiller. 284-293 [doi]
- Estimating End-to-End Performance by Collaborative Prediction with Active SamplingIrina Rish, Gerald Tesauro. 294-303 [doi]
- A Generic Application-Oriented Performance Instrumentation for Multi-Tier EnvironmentsMarkus Schmid, Marcus Thoss, Thomas Termin, Reinhold Kröger. 304-313 [doi]
- Network Instrumentation for End-to-End MeasurementsBengi Karacali, Balaji Rao. 314-322 [doi]
- SNMP Traffic Analysis: Approaches, Tools, and First ResultsJürgen Schönwälder, Aiko Pras, Matús Harvan, Jorrit Schippers, Remco van de Meent. 323-332 [doi]
- SANchk: An SQL-Based Validation System for SAN ConfiurationEray Gencay, Wolfgang Küchlin, Thorsten Schafer. 333-342 [doi]
- A decision support tool to optimize scheduling of IT changesRodrigo Rebouças, Jacques Philippe Sauvé, Antão Moura, Claudio Bartolini, David Trastour. 343-352 [doi]
- Planning and Managing the IPTV Service DeploymentDakshi Agrawal, Mandis Beigi, Chatschik Bisdikian, Kang-Won Lee. 353-362 [doi]
- Automation Controller for Operational IT ManagementSven Graupner, Nigel Cook, Derek Coleman. 363-372 [doi]
- Assessing the security of VoIP ServicesHumberto J. Abdelnur, Radu State, Isabelle Chrisment, C. Popi. 373-382 [doi]
- A Trustworthy Mobile Agent Infrastructure for Network ManagementAlexandros Koliousis, Joseph S. Sventek. 383-390 [doi]
- A Hybrid Approach to Operating System Discovery using Answer Set ProgrammingFrançois Gagnon, Babak Esfandiari, Leopoldo E. Bertossi. 391-400 [doi]
- A Version-aware Approach for Web Service Client ApplicationRu Fang, Ying Chen, Liana Fong, Linh Lam, David Frank, Christopher Vignola, Nan Du. 401-409 [doi]
- Flexible Automatic Service Brokering for SOAsSteffen Bleul, Michael Zapf, Kurt Geihs. 410-419 [doi]
- An Evaluation of Service Composition Technologies Applied to Network ManagementRicardo Lemos Vianna, Everton Rafael Polina, Clarissa Cassales Marquezan, Leandro Bertholdo, Liane Margarida Rockenbach Tarouco, Maria Janilce Bosquiroli Almeida, Lisandro Zambenedetti Granville. 420-428 [doi]
- Declarative Specification of Service Management AttributesVitalian A. Danciu, Nils gentschen Felde, Martin Sailer. 429-438 [doi]
- Service Assurance Process Re-Engineering Using Location-aware Infrastructure IntelligenceHani Jamjoom, Nikos Anerousis, Raymond B. Jennings III, Debanjan Saha. 439-448 [doi]
- Service Management in a Dynamic E-Business EnvironmentMarcus O Connell, Vincent Wade. 449-458 [doi]
- On the Performance of Web Services Management Standards - An Evaluation of MUWS and WS-Management for Network ManagementGiovane Cesar Moreira Moura, Giancarlo Silvestrin, Ricardo Nabinger Sanchez, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville. 459-468 [doi]
- Access Point Selection for Improving Throughput Fairness in Wireless LANsVasilios A. Siris, Despina Evaggelatou. 469-477 [doi]
- Design and Evaluation of Distributed Load-Balancing for Wireless NetworksGiorgio Nunzi, Simon Schütz, Marcus Brunner. 478-486 [doi]
- A toolbox of mechanisms for robust and scalable service discovery in mobile ad-hoc networksMichael Kreutzer, Manuel Hartl. 487-496 [doi]
- Network Element Auto-configuration in a Managed NetworkHenning Sanneck, Lars-Christoph Schmelz, Thomas Baumgarth, Konstantin Keutner. 497-515 [doi]
- Customer Equipment Configuration Manager for Managed Network Service ProvidersKenji Hori, Kiyohito Yoshihara, Hiroki Horiuchi. 516-526 [doi]
- The Cost Effective, Efficient Integrated-View Solution : Identification & Personalization for OSS Created ContentsKyunghwa Ohk, Deokhan Kim. 527-541 [doi]
- Automated Management of Disaster Recovery Systems Using Adaptive SchedulingTapan Kumar Nayak, Upendra Sharma. 542-545 [doi]
- Management of Biometric Data in a Distributed Internet EnvironmentBurkhard Stiller, Thomas Bocek, P. Ming, F. Eyennann, J. Sauerland, J. Angrabeit, M. Volkl, J.-C. Tylka. 546-559 [doi]
- Towards usable and reasonable Identity Management in heterogeneous IT infrastructuresSebastian Rieger, Bernhard Neumair. 560-574 [doi]
- Building a Grid Infrastructure with Instant-Grid for Demonstration, Test and DevelopmentChristian Boehme, Ulrich Schwardmann. 575-585 [doi]
- Managing P2P services via the IMSAntonio Liotta, Ling Lin. 586-600 [doi]
- Troubleshooting SIP EnvironmentsJ. Shiva Shankar, M. Malathi Latha. 601-611 [doi]
- TestYourVoIP - A System for Measuring Internet Voice QualityMark W. Sylor, Nagarjuna Venna, Harrison Ripps, Benjamin Bennett. 612-626 [doi]
- Finding Elephant flows for optical networksTiago Fioreze, Mattijs Oude Wolbers, Remco van de Meent, Aiko Pras. 627-640 [doi]
- Mining Infrastructure Data for System Management OptimizationChang-Shing Perng, Shang Guo. 641-654 [doi]
- Applying Autonomic Computing with Open Standardized Resource Interface WSDM to Managing Multi-vendor IT SystemsYoshikazu Satoh, Yuhsuke Kaneyasu, Jung-Kook Hong, Yuhichi Komatsu, Kazuo Iwano, Satoshi Tutiya, Tsuneo Katsuyama, Hiroshi Yoshida. 655-669 [doi]
- Entity MIB and VirtualizationShiva Shankar J. 670-683 [doi]
- A CASE Tool to Support the MIB Development ProcessShyyunn Sheran Lin, Mike Cheng. 684-696 [doi]
- Fault Management based on peer-to-peer paradigms; A case study report from the CELTIC project MadeiraMarkus Leitner, Philipp Leitner, Martin Zach, Sandra Collins, Claire Fahy. 697-700 [doi]
- Galapagos: Automatically Discovering Application-Data Relationships in Networked SystemsKostas Magoutis, Murthy V. Devarakonda, Kiran Muniswamy-Reddy. 701-704 [doi]
- Hierarchically Federated Registration and Lookup within the perfSONAR FrameworkJason Zurawski, Jeff W. Boote, Eric L. Boyd, Maciej Glowiak, Andreas Hanemann, D. Martin Swany, Szymon Trocha. 705-708 [doi]
- IT Service Management for Campus Environment-Practical Concerns in ImplementationStewart H. C. Wan, Yuk-Hee Chan. 709-712 [doi]
- Learning attack strategies through mining and correlation of security alarmsWang Li, Li Zhi-tang, Lei Jie. 713-716 [doi]
- OSPF Failure Identification based on LSA Flooding AnalysisYuichiro Hei, Tomohiko Ogishi, Shigehiro Ano, Toru Hasegawa. 717-720 [doi]
- Policy-driven Business Management over Web ServicesStephen Gorton, Stephan Reiff-Marganiec. 721-724 [doi]
- Realising Adaptive Web Services through Automated Policy RefinementKevin Carey, Vincent Wade. 725-728 [doi]
- Reducing Complexity of Software Deployment with Delta ConfigurationArijit Ganguly, J. Yin, H. Shaikh, David M. Chess, T. Eilem, Renato J. O. Figueiredo, J. Hansom, A. Mohindra, Giovanni Pacifici. 729-732 [doi]
- Reliability of Service Level Estimators in the Data CentreJon Henrik Bjornstad, Mark Burgess. 733-736 [doi]
- Requirements for Managing Distributed Packet Filter Configurations in Carrier-grade NetworksBirger Tödtmann, Erwin P. Rathgeb. 737-740 [doi]
- Roles Considered Harmful in Policy-based Management for Dynamic OrganisationsKevin Feeney, David Lewis, Vincent Wade. 741-744 [doi]
- Seamless Integration of Network Management Tools in a Multi-Domain EnvironmentSlavko Gajin, Vedrin Jeliazkov, Constantinos Kotsokalis, Yannis Mitsos. 745-748 [doi]
- Self-Management of Context-Aware Overlay Ambient NetworksBertrand Mathieu, Meng Song, Alex Galis, Lawrence Cheng, Kerry Jean, Roel Ocampo, Marcus Brunner, Martin Stiemerling, Marco Cassini. 749-752 [doi]
- Server Capacity Planning with Priority Allocation for Service Level Management in Heterogeneous Server ClustersShinji Nakadai, Kunihiro Taniguchi. 753-756 [doi]
- Service Provider Considerations for IT Service ManagementLarisa Shwartz, Naga Ayachitula, Melissa J. Buco, Maheswaran Surendra, Christopher Ward, Steve Weinberger. 757-760 [doi]
- SML Model-based ManagementRicardo Rivaldo, Guilherme Germoglio, Flavio Santos, Yuan Chen, Dejan S. Milojicic, Robert Adams. 761-764 [doi]
- Storage Planning and Management Using a Web-Based Management ServiceV. Gogate, Vijay K. Naik, I. Narang, U. Sharma, Pradeep Varma. 765-768 [doi]
- Towards Automatic Composition of Network Management Web ServicesTorsten Klie, Felix Gebhard, Stefan Fischer. 769-772 [doi]
- Towards Autonomic Provisioning of Wireless Grid ServicesMohamed El-Darieby, Diwakar Krishnamurthy. 773-776 [doi]
- Virtualizing Resources: Customer-Oriented Cross-Domain Monitoring for Service GridsTimo Baur, Sameh Saad. 777-780 [doi]
- A Capacity Planning Framework for Multi-tier Enterprise Services with Real WorkloadsQi Zhang, Ludmila Cherkasova, Guy Mathews, Wayne Greene, Evgenia Smirni. 781-784 [doi]
- A Classification-Based Approach to Policy RefinementYathiraj B. Udupi, Akhil Sahai, Sharad Singhal. 785-788 [doi]
- A distributed signaling for the provisioning of on-demand VPN services in transport networksFabio Baroncelli, Barbara Martini, Valerio Martini, Piero Castoldi. 789-792 [doi]
- A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor NetworksShanshan Li, Shaoliang Peng, Xiangke Liao, Peidong Zhu, Yuxing Peng. 793-796 [doi]
- A Framework for Lightweight QoS Provisioning: Network Planes and Parallel InternetsNing Wang, David Griffin, Jason Spencer, Jonas Griem, Jorge Rodriguez Sanchez, Mohamed Boucadair, Eleni Mykoniati, Bruno Quoitin, Michael P. Howarth, George Pavlou, A. J. Elizondo, María L. García Osma, Panos Georgatsos. 797-800 [doi]
- A Logic-based Approach for IP Network Services Management and ConfigurationPedro Alípio, José Neves, Paulo Carvalho. 801-804 [doi]
- A Model-based Simulation Approach to Error Analysis of IT ServicesLong Wang, Akhil Sahai, Jim Pruyne. 805-808 [doi]
- A Scalable Modeling Language for Specifying Access Control in Tree Based StructuresArne Øslebø. 809-812 [doi]
- An Algorithm to Detect Packet Forwarding Misbehavior in Mobile Ad-Hoc NetworksOscar F. Gonzalez, Michael P. Howarth, George Pavlou. 813-816 [doi]
- An Autonomic Approach to Verify End-to-End Communication QualityAndreas Binzenhöfer, Daniel Schlosser, Kurt Tutschku, Markus Fiedler. 817-820 [doi]
- An information model for the management of Optical Burst Switched networksJorge E. López de Vergara, Javier Aracil, José Alberto Hernández. 821-824 [doi]
- Artifact Reuse Method using Knowledge Base to Develop Operation Support SystemsMasateru Inoue, Masataka Sato, Shingo Horiuchi, Takashi Inoue, Tetsuya Yamamura. 825-828 [doi]
- Authentication Optimization for Seamless HandoversBrahim Gaabab, David Binet, Jean-Marie Bonnin. 829-832 [doi]
- Automated deployment and Aggregated access control for SOA composite applicationsIndrajit Poddar, Germán S. Goldszmidt. 833-847 [doi]
- Automated Provisioning of Shared ServicesKeith I. Farkas, Subu Iyer, Vijay Machiraju, Jim Pruyne, Akhil Sahai. 848-851 [doi]
- Automatic Structuring of IT Problem Ticket Data for Enhanced Problem ResolutionXing Wei, Anca Sailer, Ruchi Mahindru, Gautam Kar. 852-855 [doi]
- Automating the Generation, Deployment and Application of Charging Schemes for Composed IMS ServicesLei Xu, Brendan Jennings. 856-859 [doi]
- Autonomic Management of Component-Based Embedded SoftwareFabien Romeo, Franck Barbier, Jean-Michel Bruel. 860-863 [doi]
- AutoSeek: A Method to Identify Candidate Automation Steps in IT Change ManagementBiplav Srivastava. 864-867 [doi]
- Design of NGOSS TSA Using Web Services TechnologiesMi-Jung Choi, Hong-Taek Ju, James Won-Ki Hong, Dong-Sik Yun. 868-871 [doi]
- Design of the pCASE Platform for enabling Context Aware ServicesBruno Van Den Bossche, Matthias Strobbe, Gregory De Jans, Jan Hollez, Filip De Turck, Bart Dhoedt, Piet Demeester, Gerard Maas, Bert Van Vlerken, Johan Moreels, Nico Janssens, Thierry Pollet. 872-875 [doi]
- Extracting Bulk Configuration Data from a Relational UMTS Management DatabaseXiaosong Zhu, Paul Jacob, Enda Fallon, Fintan Donagh, Eoin O Mearal, Gregory Hayes, Yuansong Qiao. 876-879 [doi]